New AT&T Research Finds 75% of Email Traffic is Suspicious
And 50% of Businesses Have Outdated Cybersecurity Protections
New AT&T* research shows many businesses are not effectively protecting their data. As more organizations adopt cloud architectures, traditional security protections aren’t enough.
The latest AT&T Cybersecurity Insights report, “The CEO’s Guide to Data Security,” details how this is affecting data security, and what businesses can do to help protect their data.
“Every business wants new technologies that help save time, cut costs or provide better services,” said Steve McGaw, chief marketing officer, AT&T Business Solutions. “This report helps them take advantage of these technologies without compromising the security of their business.”
It is critical that businesses continue to evolve their security practices with the latest technologies and embrace newer cybersecurity solutions that can help protect information at rest or in motion, and within the cloud.
New cyberthreats emerge every day. Yet, 50% of businesses surveyed have not changed their cybersecurity protections in over 3 years. Seemingly simple threats like email spam or phishing have become a major threat to businesses.
AT&T blocks 75% of email traffic transmitted across its network every day due to suspicious content. That equates to 400 million spam messages each day.
These numbers are only growing. In the first half of 2016, AT&T saw a 400% increase in attackers searching for vulnerabilities in IoT devices. This type of increased activity in 2016 resulted in a series of major IoT-centric attacks on two Internet service providers.
The latest AT&T report covers these threats and provides insight on steps today’s businesses can take to help protect themselves. Consider these tactics:
- Update Identity and Access Management Systems. The latest technologies can restrict device use to only approved users. Software-defined networking perimeters can also help prevent malicious actors from accessing proprietary information.
- Implement Threat Analytics. Threat analytics systems scan overall network activity to flag behavioral changes like a spike in data traffic or a new user on the system to help identify new emerging threats.
- Move to Virtualized Security Functions. Software-defined networking (SDN) means that security can be deployed and updated in near real-time over software systems. SDN helps protect information stored in the cloud or on premise.
- Create an Incident Response Team. A plan and team are crucial to handling a possible security issue. Quick response is essential to mitigating and reducing the impact a cyberattack could have on your business.
To learn more about what today’s businesses are facing and how to stay prepared, check out “The CEO’s Guide to Data Security.”
*AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc.
AT&T Inc. (NYSE:T) helps millions around the globe connect with leading entertainment, mobile and high speed internet services. We offer the nation’s best data network* and the best global coverage of any U.S. wireless provider.** We’re one of the world’s largest providers of pay TV. We have TV customers in the U.S. and 11 Latin American countries. Nearly 3.5 million companies, from small to large businesses around the globe, turn to AT&T for our highly secure smart solutions.
© 2017 AT&T Intellectual Property. All rights reserved. AT&T, the Globe logo and other marks are trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
*Claim based on the Nielsen Certified Data Network Score. Score includes data reported by wireless consumers in the Nielsen Mobile Insights survey, network measurements from Nielsen Mobile Performance and Nielsen Drive Test Benchmarks for Q3+Q4 2016 across 121 markets.
**Global coverage claim based on offering discounted voice and data roaming; LTE roaming; and voice roaming in more countries than any other U.S. based carrier. International service required. Coverage not available in all areas. Coverage may vary per country and be limited/restricted in some countries.